Chapter Mining Large Information Networks by Graph Summarization 2010 • LINK MINING: MODELS, ALGORITHMS, AND APPLICATIONS • 475-501 Chen C, Lin CX, Fredrikson M, Christodorescu M, Yan X, Han J
Conference Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors 2010 • IEEE Symposium on Security and Privacy: Proceedings • 45-60 Fredrikson M, Jha S, Christodorescu M, Sailer R, Yan X
Journal Article Mining graph patterns efficiently via randomized summaries 2009 • Proceedings of the VLDB Endowment • 2(1):742-753 Chen C, Lin CX, Fredrikson M, Christodorescu M, Yan X, Han J
Conference A Layered Architecture for Detecting Malicious Behaviors 2008 • Lecture Notes in Computer Science • 5230:78-+ Martignoni L, Stinson E, Fredrikson M, Jha S, Mitchell JC